This commit is contained in:
kp2pml30 2025-06-08 14:51:48 +04:00
parent 47ac57a230
commit a8ad7a3231
Signed by: kp2pml30
GPG key ID: CD6528BAC23E3E34
7 changed files with 13 additions and 12 deletions

8
flake.lock generated
View file

@ -68,17 +68,17 @@
"systems": "systems"
},
"locked": {
"lastModified": 1744493823,
"narHash": "sha256-GBadamNxakZitu7zMNHJTaDpSe3ZcRyZAtBuB8mKdhI=",
"lastModified": 1746476573,
"narHash": "sha256-n8492bBXn4GY7JHzgIB1LvCTCr9EkWQW+3zVHjS6B9Y=",
"owner": "kp2pml30",
"repo": "kp2pml30.github.io",
"rev": "fa9019733540a9569fd6c678c358c8b7a61f435c",
"rev": "0babadc3ebeddc96dbe84a90f3d36117c5e942a4",
"type": "github"
},
"original": {
"owner": "kp2pml30",
"repo": "kp2pml30.github.io",
"rev": "fa9019733540a9569fd6c678c358c8b7a61f435c",
"rev": "0babadc3ebeddc96dbe84a90f3d36117c5e942a4",
"type": "github"
}
},

View file

@ -19,7 +19,7 @@
#};
kp2pml30-moe = {
url = "github:kp2pml30/kp2pml30.github.io/fa9019733540a9569fd6c678c358c8b7a61f435c";
url = "github:kp2pml30/kp2pml30.github.io/0babadc3ebeddc96dbe84a90f3d36117c5e942a4";
inputs.nixpkgs.follows = "nixpkgs";
};
};

View file

@ -21,4 +21,6 @@ in lib.mkIf cfg.hardware.wireless {
enable = true;
powerOnBoot = true;
};
environment.systemPackages = with pkgs; [ bluetui ];
}

View file

@ -82,6 +82,7 @@ in {
"opera"
"discord-ptb"
"slack"
"anytype"
];
};
}

View file

@ -18,6 +18,8 @@ in {
./messengers-work.nix
];
environment.systemPackages = [ pkgs.anytype ];
fonts.packages = with pkgs; [
fira-code
fira-code-nerdfont

View file

@ -12,12 +12,6 @@ in lib.mkIf cfg.messengers.personal {
users.users.${cfg.username}.packages = with pkgs; [
discord-ptb
telegram-desktop
(pkgs.callPackage "${toString pkgs.path}/pkgs/by-name/si/signal-desktop/generic.nix" {} rec {
pname = "signal-desktop";
dir = "Signal";
version = "7.46.0";
url = "https://updates.signal.org/desktop/apt/pool/s/signal-desktop/signal-desktop_${version}_${signalSuffix}.deb";
hash = "sha256-HbmyivfhvZfXdtcL/Cjzl4v0Ck/fJCD517iTjIeidgc=";
})
pkgs.signal-desktop
];
}

View file

@ -34,6 +34,8 @@ in {
];
config = {
security.pam.enableSSHAgentAuth = true;
users.users."${cfg.username}" = {
isNormalUser = true;
openssh.authorizedKeys.keys = [